Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption And Decryption Device In Wireless Portable Internet System,And Method Thereof

Inactive Publication Date: 2008-07-17
SAMSUNG ELECTRONICS CO LTD +4
View PDF10 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the ECB mode, each block is encrypted and decrypted independently of any other block in the simplest way and thus it has a drawback of reducing cryptographic security.
However, when the size of the message is relatively small, adding a field to a message may have t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption And Decryption Device In Wireless Portable Internet System,And Method Thereof
  • Encryption And Decryption Device In Wireless Portable Internet System,And Method Thereof
  • Encryption And Decryption Device In Wireless Portable Internet System,And Method Thereof

Examples

Experimental program
Comparison scheme
Effect test

Example

[0107]As shown in FIG. 12, similar to the initial vector generator in the second exemplary embodiment, each initial vector generator 11 and 21 according to the third exemplary embodiment of the present invention includes a frame number determination module 111, a header extract module 112, an identifier determination module 113, a logic operation module 114, a generation module 115, and a ZHC 116, but differing from the second exemplary embodiment, the initial vector generators 11 and 21 according to the third exemplary embodiment of the present invention further include a counter correction unit 117 for correcting a count value.

[0108]A loss of a broadcast frame may occur due to various causes in the wireless channel. Therefore, when counting the number of zero hits of the object field, e.g., the PHY SYN field, a frame that includes the field may be lost, thereby causing malfunction of the zero hit counter so that the zero hit counter may not be able to count the zero hit.

[0109]Ther...

Example

[0127]Such an RN field may be selectively applied to the first to third exemplary embodiments of the present invention. In this case, assume that an RN field is added to each message in addition to a header field, a data field, and a CRC field in the first to the third exemplary embodiments.

[0128]In the case of the first exemplary embodiment, a PHY SYN field may be replaced with an RN field. In this case, the frame number determination module 111 of the initial vector generator 11 determines a random value of the RN field. Therefore, the initial vector generator 11 generates an initial vector for encryption by using GMH field information of the message, a MAC address of a subscriber station which is selectively used, and the random value of the RN field that replaces a frame number of a PHY SYN field, and encrypts and decrypts a message.

[0129]In addition, in the case of applying the RN field, the concept of the zero hit counter may be applied as in the second exemplary embodiment to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to encryption and decryption apparatuses in a wireless portable Internet system, and a method thereof. In the wireless portable Internet system, a subscriber station and a base station share an encryption during key distribution, and a message is encrypted with the encryption key and transmitted. In this case, a first initial vector is generated for encryption based on information shared by the subscriber station and the base station in a wireless channel, and the message is encrypted with the first initial vector and the encryption key and is then transmitted. In addition, a second initial vector for decryption is generated based on information shared by the subscriber station and the base station in the wireless channel, and the encrypted message is decrypted with the second initial vector and the encryption key. Herein, the first initial vector corresponds to the second initial vector.

Description

TECHNICAL FIELD[0001]The present invention relates to a cryptographic technique in a wireless portable Internet system, and more particularly, relates to encryption / decryption apparatuses for secure transmission / receiving of messages in a wireless portable Internet system, and a method thereof.BACKGROUND ART[0002]As next-generation communication technology, wireless portable Internet access further provides mobility to a local data communication system, such as a conventional wireless local area network (LAN), using a stationary access point. There are various standard protocols that have been developed for supporting wireless portable Internet access, and the IEEE 802.16 working group is trying to establish an international standard of wireless portable Internet protocol. The IEEE 802.16 is a specification for a metropolitan area network (MAN) that supports an information communication network in a geographic area or region larger than that covered by a local area network (LAN) but...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06G06F17/00H04L9/28
CPCH04L9/12H04L63/0428H04L63/062H04L2209/80H04W12/04H04L9/0637H04L9/0838H04W12/02H04W12/033B65G43/08B65G2201/0217B65H54/00B65H2701/36
Inventor CHANG, SUNG-CHEOLCHA, JAE-SUNCHO, SEOK-HEONYOON, CHUL-SIK
Owner SAMSUNG ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products